Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 04 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 04 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress |
|
Vendors & Products |
Wordpress
Wordpress wordpress |
Thu, 04 Sep 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Deletion | |
Weaknesses | CWE-36 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-09-04T17:20:07.540Z
Reserved: 2025-08-26T23:18:49.599Z
Link: CVE-2025-9518

Updated: 2025-09-04T17:19:59.625Z

Status : Awaiting Analysis
Published: 2025-09-04T10:42:35.410
Modified: 2025-09-04T15:35:29.497
Link: CVE-2025-9518

No data.

Updated: 2025-09-04T13:12:12Z